An attack that attempts to deny corporate computing resources to legitimate users is a ______________.

A. virus
B. denial of service
C. worm
D. Trojan
E. replay attack


Answer: B

Computer Science & Information Technology

You might also like to view...

Press ____ to open the Save As dialog box.

a. CTRL+S b. SHIFT+S c. SHIFT+CTRL+S d. ALT+S

Computer Science & Information Technology

When you work in Design view, pressing ____ creates a paragraph element and a line of white space.

A. [Enter] B. [Shift][Enter] C. [Ctrl][Enter] D. [Alt][Enter]

Computer Science & Information Technology

It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.

A. .008788 seconds B. 4.5 seconds C. 2.5 hours D. 58 hours

Computer Science & Information Technology

A(n) ____________________  assigned during incident management indicates how serious a problem is and how many users are affected.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology